• Nenhum resultado encontrado

Multi-User

Multi User Detection For Cdma-Ofdm/Oqam System Combined With Space Time Coding

Multi User Detection For Cdma-Ofdm/Oqam System Combined With Space Time Coding

... In this paper, we propose the combination of Multi Carrier (MC) OFDM/OQAM modulation and CDMA- called MC-CDMA-OQAM system with Space Time (ST) coding in a multi user context. This combination takes ...

9

AN EDUCATIONAL MULTI – USER MEASUREMENT SYSTEM (EMUMS)

AN EDUCATIONAL MULTI – USER MEASUREMENT SYSTEM (EMUMS)

... communication. Using addressing MS1 knows which ME responded. All ME have unique addresses that are determined automatically. Input signals can be allocated to any number of measurement emulators. In this way, ...

8

Hybrid Iterative Space-Time Equalization for Multi-User mmW Massive MIMO Systems

Hybrid Iterative Space-Time Equalization for Multi-User mmW Massive MIMO Systems

... assuming perfect knowledge of the channel sate information (CSI) and single antenna user terminals (UTs). A downlink hybrid beamforming scheme based on a weighted sum mean square error (WSMSE) optimization ...

13

Multiple Input Multiple Output System with Multi User Support Based on Directive Information Transmission

Multiple Input Multiple Output System with Multi User Support Based on Directive Information Transmission

... each user only knows the transmission parameters regarding his data ...each user is able to configure the receiver with the correct coefficients g i α 0 i to compensate ...

7

Cooperative multi-user detection and ranging based on pseudo-random codes

Cooperative multi-user detection and ranging based on pseudo-random codes

... In a real application one has to take care to limit the max- imum passed time as it can only be determined by a limited accuracy due to clock errors.. For example with a crystal os- zill[r] ...

5

A Multi-user Adaptive Security Application for Educational Hacking

A Multi-user Adaptive Security Application for Educational Hacking

... 5. After performing step 4, which is a stored crossed site scripting attack combined with a PHP injection attack, continue checking the provided email. When another student browses to the exploited comment page, the PHP ...

6

Control of multiuser services in mobile heterogeneous environments

Control of multiuser services in mobile heterogeneous environments

... of multi-user communication services over heterogeneous environments, where services are destined for large audiences, independently of the location of users and of the moment when those services are ...

10

Q3M: QoS architecture for multiuser mobile multimedia sessions in 4G systems eve  Q3M

Q3M: QoS architecture for multiuser mobile multimedia sessions in 4G systems eve Q3M

... MUSC interacts with SIP to allow users to join or leave a multi-user session. Applications compose a SIP/SDP message to join announced sessions. This message is received by a SIP-proxy in the ...

12

eve  Scalable Resource

eve Scalable Resource

... Fig. 5 shows the load of RESERVE messages measured in the ingress router of the simulation model. The traced results expose that within all admitted requests, MIRA established 65.9% and MARA 65.7% (less 2) ...

6

Evaluation of Spectral Efficiency, System Capacity And Interference Effects on CDMA Communication System

Evaluation of Spectral Efficiency, System Capacity And Interference Effects on CDMA Communication System

... The type of interference experienced in CDMA communication systems is the Multiple Access Interference or the Multi-user Interference. Multiple Access Interference (MAI) is a factor, which limits the ...

6

Performance evaluation of IB-DFE-based strategies for SC-FDMA systems

Performance evaluation of IB-DFE-based strategies for SC-FDMA systems

... evaluate multi-user iterative block decision feedback equalization (IB-DFE) schemes for the uplink of single-carrier frequency-division multiple access (SC-FDMA)-based ...space-frequency ...

10

An integrated approach to control the quality level of multiuser sessions eve  an integrated

An integrated approach to control the quality level of multiuser sessions eve an integrated

... different multi-user sessions ...for Multi- user Sessions (QUALITI) mechanism to control the QoS level of multi-user sessions by integrating QoS mapping, QoS adaptation and ...

9

Scalable multimedia group  through the oprovisioning of network resources

Scalable multimedia group through the oprovisioning of network resources

... in multi-user systems, this paper introduces the Multi-user Aggregated Resource Allocation (MARA) ...IP multi-user sessions, while minimizing signalling, state and processing ...

12

Object Modeling for User-Centered Development and User Interface Design: The Wisdom Approach

Object Modeling for User-Centered Development and User Interface Design: The Wisdom Approach

... the user interface from the functional core in conceptual and implementation architectural models for interactive ...on user-interface knowledge in providing design assistance (evaluation, exploration) and ...

285

An Extensible and Secure Framework for Distributed Applications

An Extensible and Secure Framework for Distributed Applications

... the Multi User Virtual Drawing Board will look in the same manner as shown through the ...the multi user virtual drawing board and the basic advantage behind such an ...

9

PREDICTION BASED CHANNEL-HOPPING ALGORITHM FOR RENDEZVOUS IN COGNITIVE RADIO NETWORKS

PREDICTION BASED CHANNEL-HOPPING ALGORITHM FOR RENDEZVOUS IN COGNITIVE RADIO NETWORKS

... two user scenarios involving two secondary users and variable primary users and aim at reducing the ...with multi-user scenario and provides a methodology for the users to find each other in the very ...

7

A resource reservation protocol supporting QoSaware multicast trees for next generation networks

A resource reservation protocol supporting QoSaware multicast trees for next generation networks

... This paper presents the requirements to control the resources for multi-user sessions in environments with asymmetric routing and proposes a new solution called Multi-servIce Resource Al[r] ...

8

User Characteristics、User Involvement and Technology Acceptance in Library Automation System Usage

User Characteristics、User Involvement and Technology Acceptance in Library Automation System Usage

... of user characteristics, user involvement and technology acceptance, also try to find the relationship of the above three variables and library automation system ...

27

Cloud Computing: A study of cloud architecture and its patterns

Cloud Computing: A study of cloud architecture and its patterns

... Stands for real time de-provisioning. Just-intime provisioning indicates the federation of user accounts without sharing prior data, based on some trust model. Service Provisioning Markup Language (SPML) provides ...

6

A new model of web-based application to social networking management systems

A new model of web-based application to social networking management systems

... It can be stated that most small communities have the capacity to influence more people be- cause they possess greater knowledge of issues, products or services, which in turn leads to an increased confidence by the ...

72

Show all 2965 documents...

temas relacionados